Security, General security guidelines, Password guidelines – HP Integrated Lights-Out User Manual

Page 43

Advertising
background image

Configuring iLO 2 43

Security

iLO 2 enables you to customize iLO 2 security settings. To access iLO 2 security settings, select
Administration>Security. iLO 2 security options include

SSH key administration (on page

46

)

SSL certificate administration (on page

47

)

Two-factor authentication (on page

48

)

Directory settings (on page

53

)

iLO 2 encryption

HP SIM single sign-on ("

HP SIM single sign-on (SSO)

" on page

57

)

Remote Console Computer Lock (on page

60

)

iLO 2 security options enables iLO 2 to provide the following security features:

User-defined TCP/IP ports

User actions logged in the iLO 2 Event Log

Progressive delays for failed login attempts

Support for X.509 CA signed certificates

Support for securing RBSU

Encrypted communication using:

o

SSH key administration

o

SSL certificate administration

Support for optional LDAP-based directory services

Some of these options are licensed features. To verify your available options, see the section, "Licensing
(on page

25

)."

General security guidelines

The following are general guidelines concerning security for iLO 2:

For maximum security, iLO 2 should be set up on a separate management network.

iLO 2 should not be connected directly to the Internet.

A 128-bit cipher strength browser must be used.

Password guidelines

The following is a list of recommended password guidelines. Passwords should:

Never be written down or recorded

Never be shared with others

Not be words generally found in a dictionary, or easy to guess words, such as the company name,

product names, the user's name, or the user's User ID

Include at least three of the four following characteristics:

Advertising